Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25893 | diskover-web v2.3.0 Community Edition is vulnerable to multiple reflected cross-site scripting (XSS) flaws in its web interface. Unsanitized GET parameters including maxage, maxindex, index, path, q (query), and doctype are directly echoed into the HTML response, allowing attackers to inject and execute arbitrary JavaScript when a victim visits a maliciously crafted URL. |
Tue, 09 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Diskoverdata
Diskoverdata diskover |
|
| CPEs | cpe:2.3:a:diskoverdata:diskover:2.3.0:*:*:*:community:*:*:* | |
| Vendors & Products |
Diskoverdata
Diskoverdata diskover |
Wed, 27 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | diskover-web v2.3.0 Community Edition is vulnerable to multiple reflected cross-site scripting (XSS) flaws in its web interface. Unsanitized GET parameters including maxage, maxindex, index, path, q (query), and doctype are directly echoed into the HTML response, allowing attackers to inject and execute arbitrary JavaScript when a victim visits a maliciously crafted URL. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-27T15:12:25.150Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50985
Updated: 2025-08-27T15:10:34.809Z
Status : Analyzed
Published: 2025-08-27T15:15:38.493
Modified: 2025-09-09T18:53:44.330
Link: CVE-2025-50985
No data.
OpenCVE Enrichment
No data.
EUVD